Appendix F
Security Testing Tools
A list of common security testing tools is discussed in this section. This is by no means an all-inclusive list of security tools and the tools that are applicable to your organizational requirements need to be identified and used accordingly.
Reconnaissance (Information Gathering) Tools
■ Ping: By sending Internet Control Message Protocol (ICMP) Echo request packets to a target host and waiting for an ICMP response, the network administration utility Ping can be used to test whether a particular host is reachable across an Internet Protocol (IP) network or not. It can also be used to measure the round-trip ...
Get Official (ISC)2 Guide to the CSSLP CBK, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.